Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

C

Picture of Yee Wei Law

Coherent attack

by Yee Wei Law - Tuesday, 29 August 2023, 5:25 PM
 

The discussion here follows from the discussion of collective attacks.

Tags:

Picture of Yee Wei Law

Coherent state

by Yee Wei Law - Thursday, 26 October 2023, 4:16 PM
 

A coherent state is a special quantum state that a coherent laser ideally emits [Wil07, p. 19].

That 👆 does not say much, but there is no straightforward way to define “coherent state”, a concept introduced by Schrödinger [SZ97, p. 46].

Mathematically and in short, a coherent state is the eigenstate of the positive frequency part of the electric field operator [SZ97, p. 46], but this requires definition of the electric field operator, which in turn requires discussion of the quantization of electromagnetic fields.

Classically, an electromagnetic field consists of waves with well-defined amplitude and phase, but in quantum mechanics, this is no longer true.

More precisely, there are fluctuations in both the amplitude and phase of the field [SZ97, Ch. 2].

coherent state is a state that has the same fluctuations of quadrature amplitudes as the vacuum state but which possibly has nonzero average quadrature amplitudes [Van06, Sec. 4.6.1].

References

[GK05] C. Gerry and P. Knight, Introductory Quantum Optics, Cambridge University Press, 2005. https://doi.org/10.1017/CBO9780511791239.
[SZ97] M. O. Scully and M. S. Zubairy, Quantum Optics, Cambridge University Press, 1997. https://doi.org/10.1017/CBO9780511813993.
[Van06] G. Van Assche, Quantum Cryptography and Secret-Key Distillation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO978051161.
[Wil07] M. M. Wilde, Quantum Information Theory, 2nd ed., Cambridge University Press, 2017. https://doi.org/10.1017/9781316809976.
Tags:

Picture of Yee Wei Law

Collective attack

by Yee Wei Law - Tuesday, 29 August 2023, 5:24 PM
 

The discussion here follows from the discussion of individual attacks.

In a collective attack [Sch10],

  • Eve prepares an ancilla state for each signal coming from Alice and lets it interact with the signal.

  • Eve passes Alice’s signal on to Bob.

References

[ETS18] ETSI, Quantum Key Distribution (QKD); Vocabulary, Group Report ETSI GR QKD 007 v1.1.1, December 2018. Available at https://www.etsi.org/deliver/etsi_gr/QKD/001_099/007/01.01.01_60/gr_qkd007v010101p.pdf.
[Sch10] S. Schauer, Attack Strategies on QKD Protocols, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-9_5.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.
Tags:

Picture of Yee Wei Law

Composite quantum systems

by Yee Wei Law - Tuesday, 10 October 2023, 9:36 AM
 

Consider a multi-qubit system consisting of two qubits. There are four possible final states: ; and it makes sense to express the quantum state of this two-qubit system as the linear combination:

where the normalisation rule still applies:

An alternative representation of is

where the subscript indicates the order of the system.

Some authors call the set , and equivalently , the tensor base [Des09, p. 316].

Watch Microsoft Research’s presentation on “Quantum Computing for Computer Scientists”:

In the vector representation, given two separated qubits:

their collective state can be expressed using the Kronecker product (also called the matrix direct product and tensor product):

Multiple shorthands exist for : 1️⃣ , 2️⃣ , 3️⃣ [Mer07, p. 6; NC10, Sec. 2.1.7]; we have used the third shorthand earlier.

In general, we can compose the Hilbert space of a multi-qubit system using the vector space direct product (also called tensor direct product) of lower-dimensional Hilbert spaces [NC10, Sec. 2.1.7]:

  • The vector space direct product is a specialisation of the direct product, and should be differentiated from Kronecker product because the latter operates on vectors and matrices.
  • Suppose and are Hilbert spaces of dimensions and respectively, then (read “ tensor ”) is an -dimensional Hilbert space.
  • Suppose and are othonormal bases for and respectively, then is a basis for .
  • Thus the elements of are linear combinations of the tensor products of the orthonormal bases for and . For example, suppose is a two-dimensional Hilbert space with basis vectors and , then every element of is a linear combination of , , and .
  • Suppose and is a linear operator on . Similarly, suppose and is a linear operator on . Then we can define the composite linear operator on by:

    The above implies

    Some authors write to differentiate (representing a Kronecker product) from (representing a direct product) [Zyg18, p. 16].

  • Inner product in is defined as

Classical-quantum state

In quantum cryptography, we often encounter states that are partially classical and partially quantum.

A classical state (c-state for short) is a state defined by a density matrix that is diagonal in the standard basis of the -dimensional state space of , i.e., has the form:

where .

Suppose we prepare the following states for Alice and Bob: with probability 1/2, we prepare and with probability 1/2, we prepare . Then, the joint state is the so-called classical-quantum state (cq-state for short):

In quantum-cryptographic convention,

  • typically denotes some (partially secret) classical string that Alice creates during a quantum protocol,
  • denotes a classical register (in fact, the symbols are reserved for classical registers),
  • denotes a quantum register, and
  • denotes some quantum information that an adversary may have gathered during the protocol, and which may be correlated with the string .

Formally,

Definition 1: Classical-quantum state (cq-state) [WN17, Definition 1.4.2]

A classical-quantum state (cq-state) takes the form

If is absent, then is simply a classical state.

References

[Des09] E. Desurvire, Classical and Quantum Information Theory: An Introduction for the Telecom Scientist, Cambridge University Press, 2009. https://doi.org/10.1017/CBO9780511803758.
[Mer07] N. D. Mermin, Quantum Computer Science: An Introduction, Cambridge University Press, 2007. https://doi.org/10.1017/CBO9780511813870.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.
[Zyg18] B. Zygelman, A First Introduction to Quantum Computing and Information, Springer Cham, 2018. https://doi.org/10.1007/978-3-319-91629-3.